US9614833B1 - Automated certificate management for a website associated with multiple certificates - Google Patents
Automated certificate management for a website associated with multiple certificates Download PDFInfo
- Publication number
- US9614833B1 US9614833B1 US14/530,315 US201414530315A US9614833B1 US 9614833 B1 US9614833 B1 US 9614833B1 US 201414530315 A US201414530315 A US 201414530315A US 9614833 B1 US9614833 B1 US 9614833B1
- Authority
- US
- United States
- Prior art keywords
- server
- certificate
- server application
- computing system
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Definitions
- Embodiments of the invention generally relate to techniques for managing digital certificates installed on a web-server. More specifically, embodiments presented herein are directed to automated approach for managing digital certificates for a single website that is associated with multiple digital certificates.
- Providing secure communication and protecting sensitive data is a well-known issue in a broad variety of contexts.
- computer servers to use digital certificates to associate a server with a network domain.
- clients use information contained in a certificate to verify the identity of a server and to establish a secure communication session with that server (e.g., an SSL or TLS session with a web server).
- digital certificates and public key infrastructure (PKI) techniques are used to create, distribute, and manage cryptographic keys used in a variety of contexts.
- a web server may host multiple domains and a different SSL certificate may be configured for each domain.
- a web server may be configured with multiple certificates for a common internet protocol (IP) address and port combination. Doing so allows clients with different capabilities to establish a secure session with the server. That is, clients that connect to the server may request varying types of SSL certificates to establish a secure connection, based on the capabilities of a given client.
- the certificates may be for different encryption key generation algorithms (e.g., RSA or DSA keys) or for different key sizes or ciphering algorithms.
- configuration files on the web server specify what certificates are available to use in establishing secure sessions with clients along with the location of such certificates.
- Managing multiple certificates on a server can be a challenge.
- Some tools are available to automate the discovery, installation, and renewal of certificates configured on a web server.
- existing solutions typically initiate an SSL handshake with the server in an attempt to identify a certificate configured on that server (which is presented by the server as part of the SSL handshake operation).
- this approach does not address a server configured with multiple SSL certificates for the same website. Instead, it results in one (of possibly) many certificates being discovered by a certificate management tool.
- Other approaches require an administrator to manually input a path to each certificate files to obtain a copy of the associated digital certificates.
- One embodiment presented herein includes a method for managing a plurality of digital certificates deployed on a server computing system.
- This method may generally include identifying, in server configuration data stored on the server computing system, two or more digital certificates associated with a first server application hosted at an IP address and port on the server computing system. Each digital certificate is generally used to establish secure communication sessions between the server application and clients.
- This method may also include recording, for each digital certificate associated with the first server application, metadata indicating at least a validity period and managing a lifecycle of one or more of the digital certificates associated with the first server application based on the recorded metadata.
- this method may further include, identifying, in the server configuration data stored on the server computing system, one or more digital certificates associated with a second server application hosted at the IP address and port.
- This method may further include recording, for each digital certificate associated with the second server application, metadata indicating at least a validity period and managing a lifecycle of each of digital certificate associated with the first server application based on the recorded metadata.
- managing the lifecycle of one or more of the digital certificates associated with the first server application may itself include identifying one or more of the digital certificates to be renewed based on the recorded validity period, generating, for each of the digital certificates to be renewed, a certificate signing request (CSR) submitted to a issuing certificate authority (CA), and receiving, for each CSR, a digital certificate. Once issued, each replacement digital certificate may be deployed to the server computing system.
- CSR certificate signing request
- CA issuing certificate authority
- Another embodiment includes a computer-readable storage medium storing instructions, which, when executed on a processor, performs an operation for managing a plurality of digital certificates deployed on a server computing system.
- the operation itself may generally include identifying, in server configuration data stored on the server computing system, two or more digital certificates associated with a first server application hosted at an IP address and port on the server computing system, wherein each digital certificate is used to establish secure communication sessions between the server application and clients.
- the operation may also include recording, for each digital certificate associated with the first server application, metadata indicating at least a validity period and managing a lifecycle of one or more of the digital certificates associated with the first server application based on the recorded metadata.
- Still another embodiment includes a server system having a processor and a memory hosting a certificate discovery and management application, which, when executed on the processor, performs an operation for managing a plurality of digital certificates deployed on the server computing system.
- the operation itself may generally include identifying, in server configuration data stored on the server computing system, two or more digital certificates associated with a first server application hosted at an IP address and port on the server computing system, wherein each digital certificate is used to establish secure communication sessions between the server application and clients.
- the operation may also include recording, for each digital certificate associated with the first server application, metadata indicating at least a validity period and managing a lifecycle of one or more of the digital certificates associated with the first server application based on the recorded metadata.
- FIG. 1 illustrates an example computing environment, according to one embodiment.
- FIG. 2 illustrates an example certificate discovery and management tool, according to one embodiment.
- FIG. 3 illustrates a method to automate the certificate discovery of multiple digital certificates associated with a common IP address, port, and hostname, according to one embodiment.
- FIG. 4 illustrates a method for renewing, configuring and installing multiple digital certificates associated with a common IP address, port and hostname, according to one embodiment.
- FIG. 5 illustrates an example computing system configured to automate the certificate discovery of multiple digital certificates associated with a common IP address, port, and hostname, according to one embodiment.
- Embodiments presented herein provide techniques to automate the discovery, installation, and renewal of multiple digital certificates configured on a web server.
- embodiments presented herein can discover and manage multiple digital certificates associated with a single internet protocol (IP) address and port on a web server, as well as certificates for multiple domains hosted on the same server.
- IP internet protocol
- a certificate management tool identifies the presence of a certificate on a given server by initiating an SSL handshake with the server. If the server presents an SSL certificate in response, then management tool begins managing the lifecycle of certificates installed on that server. Once identified, the management tool identifies the application hosting the SSL certificate and examines the appropriate application server configuration files to identify a set of certificates configured for that application on the server. Based on the information from the configuration files, the tool retrieves and examines each certificate configured on the web server, including, multiple certificates configured for the same IP address and port. When any of the certificates identified from the server configuration files is due for renewal, the tool generates a certificate signing request for each certificate due for renewal and submits the request(s) to an issuing certificate authority (CA).
- CA issuing certificate authority
- the certificate may be deployed on the server and the web server configuration files may be modified to point to the new certificate(s).
- the renewal process may be performed through automated scripts without requiring user intervention.
- the scripts may be managed by a tool installed on the server directly, but may also be invoked by an agent on the server in communication with an external management application.
- an Apache HTTPD web server is configured with an RSA-DSA certificate pair for a single IP address, port, and hostname combination.
- a management tool initiates an SSL handshake with the server and is presented with one of the certificates on the server (e.g., the RSA server).
- the management tool identifies each certificate installed for this IP address, port and hostname combination by parsing the web server configuration files. For example, for an Apache HTTPD web server, the apache.conf configuration files are parsed to find the SSL certificates associated for a single IP address, port and hostname combination.
- a separate certificate signing request (CSR) and private key is generated for each of the SSL certificates (or a subset, depending on the configuration requirements of the web server).
- CSR certificate signing request
- some versions of the Apache HTTPD server require that both an RSA and DSA certificate associated with a single IP address and port share the same private key and intermediate certificates. To satisfy this requirement, the certificate management tool would generate two CSRs and a single key pair for the same IP address and port.
- the CSRs are typically signed by a certificate authority, but could also be self-signed, as configured by the tool. However, both the RSA and DSA CSRs would be signed by the same CA signing certificate, so that any intermediate certificate chain would be the same for both the RSA and DSA certificates. Additionally, the configuration for the IP address, port, and hostname combination reflected in the apache.conf configuration file would be modified to install the new certificates. The automated task would be considered complete when all of the certificates are configured for the server. That is, the task would be complete once the paths for both the RSA-DSA certificates have been written into the SSL configuration files.
- embodiments of the invention are described below using a web-server as an example of a server application which uses SSL certificates to secure communications between server and client systems.
- One of ordinary skill in the art will recognize that embodiments described herein may be adapted to manage certificates with a variety of computing applications which use digital certificates to establish secure communication sessions with clients, particularly applications which allow multiple certificates to be configured on a common IP address, port, and hostname combination.
- FIG. 1 illustrates an example computing environment 100 , according to one embodiment.
- the computing environment 100 includes, a server system 110 , a mobile device 130 , a client system 140 , and internet enabled device 160 , each connected to a network 120 (e.g., the internet).
- the server system 110 includes a web-server 150 and an SSL/TLS certificate store 155 .
- the server system 110 is included to be representative of a physical computing system, as well as representative of virtual machine instances deployed to a computing cloud.
- web-server 150 is included to be representative of a variety of web-server applications (e.g., Apache or nginix) configured to communicate with client systems using HTTPS and related protocols.
- Web-server 150 may also communicate with other applications on server system 110 (or other systems), such as an application server and a database to respond to requests from client systems 130 and 140 .
- Client system 140 is generally included to be representative of a general purpose computing system, such as a desktop or laptop computer. As shown, the client system 140 includes a web-browser 145 used to communicate with web-server 150 .
- Mobile device 130 is generally included to be representative of small mobile computing devices, such as smart phones and computing tablets. Like client system 140 , the mobile device 130 executes a web-browser 135 in order to communicate with web-server 150 .
- Internet-enabled device 160 generally includes any other device capable of communicating over network 120 , e.g., consumer products such as thermostats, appliances, televisions, etc.
- Device 160 may include a web-client used to establish a communication session (including secure sessions) with web-server 150 . More generally, web browser 135 , web browser 145 , and device 160 may be capable of establishing a secure communication session with a web server 150 , e.g., by initiating an SSL or TLS handshake with a service at a given IP address and port combination. Further, the request may specify capabilities (or preferences) of the client for the secure session. As part of the handshake, a web server may present a digital certificate (and public key) used by the client in order to complete the handshake and establish a secure session.
- a web server may present a digital certificate (and public key) used by the client in order to complete the handshake and establish a secure session.
- the web server 150 is configured to host two different web services, labeled as web service 152 and web service 154 .
- web service 1 ( 152 ) and web service 2 ( 154 ) share a common IP address and port, but have different host names.
- a client supporting the Sever Name Indication extension to the TLS protocol may supply an indication of which web service ( 152 or 154 ) hosted by web server 150 should process a given request.
- SSL/TLS certificate store 155 may store multiple certificates for web service 1 ( 152 ), each associated with the same IP Address, port, and hostname.
- SSL/TLS certificate store 155 may host an RSA and DSA certificate, as well as an ECC certificate.
- the certificate store 155 could also include multiple RSA (or other certificates based on the same encryption algorithm) which have different attributes, e.g., two certificates with different key sizes, use attributes, or certificates signed by different certificate authorities (CAs).
- CAs certificate authorities
- SSL/TLS certificate store 155 may store multiple certificates for web service 2 ( 154 ).
- a certificate management tool may be configured to automate the discovery, installation, and renewal of certificates in the SSL/TLS certificate store 155 . That is, the certificate management tool may automate the certificate lifecycle of certificates deployed on the server 110
- FIG. 2 illustrates an example certificate discovery and management tool 203 , according to one embodiment.
- an enterprise network 200 includes the server 110 and a management server 205 .
- the server 110 includes the web-server 150 and certificate store 155 discussed above relative to FIG. 1 .
- the server 110 includes web server configuration data 210 and a certificate signing request (CSR) component 220 .
- the web server configuration 210 identifies what web services 207 are hosted by the server (e.g., for an Apache web server, by defining multiple virtual host configurations in an apache.conf configuration file) as well as what digital certificates in certificate store 155 are associated with each hosted web service.
- a website configured over a given IP address, port, and hostname could have an RSA, DSA, and ECC based certificate available to establish secure communications sessions with clients.
- management server 205 includes a management application 203 configured to automate the discovery, installation and renewal of digital certificates 155 , particularly where multiple certificates are installed for given website.
- the management server 203 includes a certificate discovery component 202 , a management component 204 , and an installation component 206 .
- the certificate discovery component 202 is configured to determine whether a server hosts an application secured using an SSL/TLS certificate.
- the discovery component 202 may initiate an SSL/TLS handshake with the web server 150 .
- the web server 150 presents a certificate to the discovery component 202 in response to the handshake, then the discovery component 202 establishes a connection with the server 110 .
- the discovery 200 may establish a shell connection with the server or connect to a management agent 225 installed on the server 110 .
- the certificate discovery component 202 parses the web-server configuration 210 to identify each hosted web service and one or more certificates associated with each such web service. That is, rather than identify only one certificate by initiating an SSL/TLS session handshake with the web server 150 , the discovery component 202 evaluates the web server configuration 210 to identify all certificates available to establish such sessions in the certificate store 155 . Once identified, the certificate discovery component 202 retrieves a copy of each certificate and identifies attributes, such as an issuer, validity period or expiration date, and certificate chain (if any). The management component 204 may schedule a renewal at a specified time prior to the expiration, e.g., one month.
- the certificate management component 204 may cause the CSR component 220 to request a new certificate.
- the CSR component 220 generates a private/public key pair.
- the public key and desired certificate attributes are stored in the CSR.
- a new private/public key pair may be generated for multiple certificates or the same private key may be used for multiple certificate requests.
- some versions of the Apache HTTPD server require that both an RSA and DSA certificate associated with a single IP address and port share the same private key and intermediate certificates.
- the CSRs are then sent to a CA which issues the requested certificates.
- the certificate installation component 206 installs the new set of certificates on the server 110 .
- the certificate installation component 206 writes a copy of each new certificate to the certificate store 155 on the local file system of the server 110 and modifies the web server configuration 210 to reference the newly installed certificates.
- management server 205 and server 110 are shown as distinct computing systems connected on an enterprise network 200 , the management application 203 could be installed on the server 110 . In such a case, the application 203 could access the web server configuration 210 directly over a locally mounted file system.
- FIG. 3 illustrates a method 300 to automate the certificate discovery of multiple digital certificates associated with a common IP address, port, and hostname, according to one embodiment.
- the method 300 begins at step 305 where a management application establishes a connection to a server hosting a web server (e.g., Apache HTTPD).
- a management application may establish a connection to the server after initiating an SSL/TLS handshake with the server and being presented with a single digital certificate in response.
- a connection could be a shell connection (e.g., ssh) or could be a connection to a dedicated network agent.
- the web server may support both multiple hosts accessed on a common IP address and port, as well as support multiple digital certificate for a given IP address, port, and hostname combination.
- the management application pareses web server configuration data (e.g., files in an apache.conf directory) to identify each configured virtual host and any digital certificates deployed for each virtual host (step 310 ).
- the management application retrieves a copy of each certificate discovered while parsing the web server configuration files. For each certificate, the management application records metadata or attributes of the certificate (step 320 ). For example, the application could record an validity period, expiration date and an indication of sets of certificates associated with a common IP address, port, and hostname combination. The application can then schedule a certificate renewal at a specified time prior to the validity period of each certificate set of certificates associated with a given IP address, port, and hostname combination.
- FIG. 4 illustrates a method 400 for renewing, configuring and installing multiple digital certificates associated with a common IP address, port and hostname, according to one embodiment.
- the method 400 begins at step 405 where the discovery and management tool establishes a connection with a server hosting installed certificate due for renewal.
- the connection may be a shell connection or a connection to a dedicated network agent on the server.
- step 405 may be omitted.
- the discovery and management tool generates, on the server system hosting the web server, a private/public key pair for each certificate being renewed on the server.
- keygen for Java
- openssl for Apache
- certutil for IIS
- the discovery and management tool generates a certificate signing request (CSR) for each new certificate and submits the request to an issuing certificate authority.
- CSR certificate signing request
- the discovery and management tool receives the requested certificates from the issuing certificate authority.
- the discovery and management tool installs each certificate on the server. For example, the discovery and management tool may write a copy of each certificate (and certificates in an associated certificate chain, if any) to a certificate store on the server, as well as update web server configuration files to reference the newly installed certificates.
- FIG. 5 illustrates an example computing system 500 configured to automate the certificate discovery of multiple digital certificates associated with a common IP address, port, and hostname, according to one embodiment.
- the computing system 500 includes, without limitation, a central processing unit (CPU) 505 , a network interface 515 , a network interface 515 , a memory 520 , and storage 530 , each connected to a bus 517 .
- the computing system 500 may also include an I/O device interface 510 connecting I/O devices 512 (e.g., keyboard, display and mouse devices) to the computing system 500 .
- I/O device interface 510 connecting I/O devices 512 (e.g., keyboard, display and mouse devices) to the computing system 500 .
- the computing elements shown in computing system 500 may correspond to a physical computing system (e.g., a system in a data center) or may be a virtual computing instance executing within a computing cloud.
- the CPU 505 retrieves and executes programming instructions stored in the memory 520 as well as stores and retrieves application data residing in the memory 530 .
- the interconnect 517 is used to transmit programming instructions and application data between the CPU 505 , I/O devices interface 510 , storage 530 , network interface 515 , and memory 520 .
- CPU 505 is included to be representative of a single CPU, multiple CPUs, a single CPU having multiple processing cores, and the like.
- the memory 520 is generally included to be representative of a random access memory.
- the storage 530 may be a disk drive storage device. Although shown as a single unit, the storage 530 may be a combination of fixed and/or removable storage devices, such as fixed disc drives, removable memory cards, optical storage, network attached storage (NAS), or a storage area-network (SAN).
- the memory 520 includes a web server 522 and a discovery and management tool 524 (or an agent that communicates with the discovery and management tool.
- the storage 530 includes server configuration data 324 and an SSL/TLS certificate store.
- the web server 522 may host a website having an IP address, port, and hostname.
- the web server 522 may have multiple digital certificates (e.g., an RSA and DSA certificate) available to present to clients requesting to establish a secure communication session.
- the discovery and management tool 524 automates the discovery, installation, and renewal lifecycle of such certificates.
- the management tool 524 or an agent on the server 500 communicating with the management tool on another server, may discover the certificates by parsing the web server configuration data 532 to identify each digital certificate associated with a given an IP address, port, and hostname combination. This may occur for multiple configured hosts (e.g., for multiple virtual host configurations).
- the management tool 524 may retrieve and identify metadata associated with each certificate as needed to manage a certificate renewal process. For example, the management tool 524 may renew a set of certificates for a common an IP address, port, and hostname combination at specified time prior to an expiration of a certificate validity period. Once renewed, the management tool may add the certificates to the certificate store 534 and update server configuration 532 .
- aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- a computer readable storage medium include: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
- a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus or device.
- each block in the flowchart or block diagrams may represent a module, segment or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by special-purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
- Embodiments of the invention may be provided to end users through a cloud computing infrastructure.
- Cloud computing generally refers to the provision of scalable computing resources as a service over a network.
- Cloud computing may be defined as a computing capability that provides an abstraction between the computing resource and its underlying technical architecture (e.g., servers, storage, networks), enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
- cloud computing allows a user to access virtual computing resources (e.g., storage, data, applications, and even complete virtualized computing systems) in “the cloud,” without regard for the underlying physical systems (or locations of those systems) used to provide the computing resources.
- a web-server controlled and operated by one party, but hosted on a cloud-computing environment could be deployed with multiple digital certificates on a given an IP address, port, and hostname combination.
- an agent installed on the cloud-based web server could communicate with the certificate discovery and management tool discussed above to automate the certificate lifecycle for such certificates.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/530,315 US9614833B1 (en) | 2014-10-31 | 2014-10-31 | Automated certificate management for a website associated with multiple certificates |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/530,315 US9614833B1 (en) | 2014-10-31 | 2014-10-31 | Automated certificate management for a website associated with multiple certificates |
Publications (1)
Publication Number | Publication Date |
---|---|
US9614833B1 true US9614833B1 (en) | 2017-04-04 |
Family
ID=58419573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/530,315 Active 2034-12-24 US9614833B1 (en) | 2014-10-31 | 2014-10-31 | Automated certificate management for a website associated with multiple certificates |
Country Status (1)
Country | Link |
---|---|
US (1) | US9614833B1 (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321318A1 (en) * | 2015-04-30 | 2016-11-03 | Hewlett-Packard Development Company, L.P. | Service provider dependency mapping |
US20170012967A1 (en) * | 2015-07-09 | 2017-01-12 | Cloudflare, Inc. | Certificate Authority Framework |
US20170126664A1 (en) * | 2015-10-28 | 2017-05-04 | Citrix Systems, Inc. | Systems and methods for policy driven fine grain validation of servers' ssl certificate for clientless sslvpn access |
US20180102905A1 (en) * | 2014-12-15 | 2018-04-12 | Amazon Technologies, Inc. | Short-duration digital certificate issuance based on long-duration digital certificate validation |
EP3490214A1 (en) * | 2017-11-24 | 2019-05-29 | Gemalto Sa | Method for managing lifecycle of credentials |
US10771261B1 (en) * | 2016-09-29 | 2020-09-08 | EMC IP Holding Company LLC | Extensible unified multi-service certificate and certificate revocation list management |
US10771260B2 (en) * | 2015-06-16 | 2020-09-08 | Vellitas Llc | Systems and methods for digital certificate security |
US20210051028A1 (en) * | 2019-08-12 | 2021-02-18 | Servicenow, Inc. | Certificate discovery and workflow automation |
CN113141353A (en) * | 2021-04-08 | 2021-07-20 | 深圳云里物里科技股份有限公司 | Storage method, reading method and device of digital certificate and gateway |
USRE48821E1 (en) * | 2009-10-12 | 2021-11-16 | Powercloud Systems, Inc. | Apparatus and methods for protecting network resources |
US11424940B2 (en) * | 2019-06-01 | 2022-08-23 | Vmware, Inc. | Standalone tool for certificate management |
US11422912B2 (en) | 2019-04-19 | 2022-08-23 | Vmware, Inc. | Accurate time estimates for operations performed on an SDDC |
EP4099628A3 (en) * | 2021-10-11 | 2023-03-29 | Beijing Baidu Netcom Science And Technology Co. Ltd. | Method and apparatus of deploying a certificate, electronic device, and storage medium |
US12132722B1 (en) | 2019-03-13 | 2024-10-29 | Amazon Technologies, Inc. | Certificate management system with forced certificate renewal |
US20250106043A1 (en) * | 2023-09-22 | 2025-03-27 | International Business Machines Corporation | Localhost Digital Certificate Discovery And Reconciliation |
WO2025094184A1 (en) * | 2023-11-05 | 2025-05-08 | Claritas Software Solutions Ltd | Method for long-term media sealing |
US20250260583A1 (en) * | 2024-02-13 | 2025-08-14 | Target Brands, Inc. | Automatic digital certificate request with software deployment |
US12418521B2 (en) * | 2023-09-08 | 2025-09-16 | Bank Of America Corporation | Systems and methods for distributed agent-based monitoring of cryptographic key stores |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090319783A1 (en) * | 2003-08-15 | 2009-12-24 | Thornton Russell S | Method of Aggregating Multiple Certificate Authority Services |
US8850185B1 (en) * | 2010-12-29 | 2014-09-30 | Amazon Technologies, Inc. | Post attack man-in-the-middle detection |
-
2014
- 2014-10-31 US US14/530,315 patent/US9614833B1/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090319783A1 (en) * | 2003-08-15 | 2009-12-24 | Thornton Russell S | Method of Aggregating Multiple Certificate Authority Services |
US8850185B1 (en) * | 2010-12-29 | 2014-09-30 | Amazon Technologies, Inc. | Post attack man-in-the-middle detection |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE48821E1 (en) * | 2009-10-12 | 2021-11-16 | Powercloud Systems, Inc. | Apparatus and methods for protecting network resources |
US11575522B2 (en) * | 2014-12-15 | 2023-02-07 | Amazon Technologies, Inc. | Short-duration digital certificate issuance based on long-duration digital certificate validation |
US20180102905A1 (en) * | 2014-12-15 | 2018-04-12 | Amazon Technologies, Inc. | Short-duration digital certificate issuance based on long-duration digital certificate validation |
US11936797B1 (en) | 2014-12-15 | 2024-03-19 | Amazon Technologies, Inc. | Short-duration digital certificate issuance based on long-duration digital certificate validation |
US20160321318A1 (en) * | 2015-04-30 | 2016-11-03 | Hewlett-Packard Development Company, L.P. | Service provider dependency mapping |
US10771260B2 (en) * | 2015-06-16 | 2020-09-08 | Vellitas Llc | Systems and methods for digital certificate security |
US20170012967A1 (en) * | 2015-07-09 | 2017-01-12 | Cloudflare, Inc. | Certificate Authority Framework |
US10791110B2 (en) * | 2015-07-09 | 2020-09-29 | Cloudflare, Inc. | Certificate authority framework |
US9948633B2 (en) * | 2015-10-28 | 2018-04-17 | Citrix Systems, Inc. | Systems and methods for policy driven fine grain validation of servers' SSL certificate for clientless SSLVPN access |
US10652229B2 (en) | 2015-10-28 | 2020-05-12 | Citrix Systems, Inc. | Systems and methods for policy driven fine grain validation of servers' SSL certificate for clientless SSLVPN access |
US11470076B2 (en) | 2015-10-28 | 2022-10-11 | Citrix Systems, Inc. | Systems and methods for policy driven fine grain validation of servers SSL certificate for clientless SSLVPN access |
US20170126664A1 (en) * | 2015-10-28 | 2017-05-04 | Citrix Systems, Inc. | Systems and methods for policy driven fine grain validation of servers' ssl certificate for clientless sslvpn access |
US10771261B1 (en) * | 2016-09-29 | 2020-09-08 | EMC IP Holding Company LLC | Extensible unified multi-service certificate and certificate revocation list management |
WO2019101509A1 (en) * | 2017-11-24 | 2019-05-31 | Gemalto Sa | Method for managing lifecycle of credentials |
EP3490214A1 (en) * | 2017-11-24 | 2019-05-29 | Gemalto Sa | Method for managing lifecycle of credentials |
US12132722B1 (en) | 2019-03-13 | 2024-10-29 | Amazon Technologies, Inc. | Certificate management system with forced certificate renewal |
US11422912B2 (en) | 2019-04-19 | 2022-08-23 | Vmware, Inc. | Accurate time estimates for operations performed on an SDDC |
US11424940B2 (en) * | 2019-06-01 | 2022-08-23 | Vmware, Inc. | Standalone tool for certificate management |
US20210051028A1 (en) * | 2019-08-12 | 2021-02-18 | Servicenow, Inc. | Certificate discovery and workflow automation |
CN113141353A (en) * | 2021-04-08 | 2021-07-20 | 深圳云里物里科技股份有限公司 | Storage method, reading method and device of digital certificate and gateway |
EP4099628A3 (en) * | 2021-10-11 | 2023-03-29 | Beijing Baidu Netcom Science And Technology Co. Ltd. | Method and apparatus of deploying a certificate, electronic device, and storage medium |
US12418521B2 (en) * | 2023-09-08 | 2025-09-16 | Bank Of America Corporation | Systems and methods for distributed agent-based monitoring of cryptographic key stores |
US20250106043A1 (en) * | 2023-09-22 | 2025-03-27 | International Business Machines Corporation | Localhost Digital Certificate Discovery And Reconciliation |
US12413423B2 (en) * | 2023-09-22 | 2025-09-09 | International Business Machines Corporation | Localhost digital certificate discovery and reconciliation |
WO2025094184A1 (en) * | 2023-11-05 | 2025-05-08 | Claritas Software Solutions Ltd | Method for long-term media sealing |
US20250260583A1 (en) * | 2024-02-13 | 2025-08-14 | Target Brands, Inc. | Automatic digital certificate request with software deployment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9614833B1 (en) | Automated certificate management for a website associated with multiple certificates | |
US11716318B2 (en) | Dynamic certificate generation on a certificate authority cloud | |
US10277580B1 (en) | Multi-algorithm key generation and certificate install | |
US10250397B1 (en) | Validating certificate chains for both internal and public facing server using unified interface | |
US10778448B2 (en) | Certificate status delivery through a local endpoint | |
US10033699B2 (en) | Transparent DNSSEC-signing proxy | |
US9716728B1 (en) | Instant data security in untrusted environments | |
CN107637044B (en) | Secure in-band service detection | |
CN103067344B (en) | The noninvasive method of automatic distributing safety regulation and equipment in cloud environment | |
US10277406B1 (en) | Authentication process for issuing sequence of short-lived digital certificates | |
US11153099B2 (en) | Reestablishing secure communication with a server after the server's certificate is renewed with a certificate authority unknown to the client | |
US11604659B2 (en) | Automated propagation of server configuration on a server cluster | |
US20160315777A1 (en) | Certificate updating | |
US20190138285A1 (en) | Provisioning of applications deployed on client devices | |
CN110036385B (en) | Hybrid Mode Cloud On-Premise (ON-PREMISE) Secure Communications | |
US20210152336A1 (en) | Automatic provisioning of key material rotation information to services | |
US9742759B2 (en) | Seamless authentication mechanism for user processes and web services residing on common host | |
CN111049789A (en) | Domain name access method and device | |
JPWO2021064874A5 (en) | ||
US20170118197A1 (en) | Sharing data between sandboxed applications with certificates | |
WO2025034881A1 (en) | Authenticating certificate bundles with asymmetric keys | |
US10530635B2 (en) | Pluggable control system for fallback website access | |
JP2017523702A (en) | Method, apparatus and system for obtaining local information | |
US11271968B2 (en) | Zero round trip time transmission for anticipatory request messages | |
US20130173907A1 (en) | Pki gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SYMANTEC CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RAO, AKSHATA KRISHNAMOORTHY;REEL/FRAME:034084/0360 Effective date: 20141030 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: DIGICERT, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC CORPORATION;REEL/FRAME:044344/0650 Effective date: 20171031 |
|
AS | Assignment |
Owner name: UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT, CONNECTICUT Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:044681/0556 Effective date: 20171031 Owner name: UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT, CONNECTICUT Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:044710/0529 Effective date: 20171031 Owner name: UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT, CONN Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:044710/0529 Effective date: 20171031 Owner name: UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT, CONN Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:044681/0556 Effective date: 20171031 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:050741/0899 Effective date: 20191016 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:050741/0918 Effective date: 20191016 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NEW YORK Free format text: FIRST LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:050741/0918 Effective date: 20191016 Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YORK Free format text: SECOND LIEN INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:050741/0899 Effective date: 20191016 |
|
AS | Assignment |
Owner name: GEOTRUST, LLC, UTAH Free format text: RELEASE OF SECOND LIEN SECURITY INTEREST IN PATENTS;ASSIGNOR:UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT;REEL/FRAME:050747/0001 Effective date: 20191016 Owner name: DIGICERT, INC., UTAH Free format text: RELEASE OF SECOND LIEN SECURITY INTEREST IN PATENTS;ASSIGNOR:UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT;REEL/FRAME:050747/0001 Effective date: 20191016 Owner name: DIGICERT, INC., UTAH Free format text: RELEASE OF FIRST LIEN SECURITY INTEREST IN PATENTS;ASSIGNOR:UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT;REEL/FRAME:050746/0973 Effective date: 20191016 Owner name: GEOTRUST, LLC, UTAH Free format text: RELEASE OF FIRST LIEN SECURITY INTEREST IN PATENTS;ASSIGNOR:UBS AG, STAMFORD BRANCH, AS COLLATERAL AGENT;REEL/FRAME:050746/0973 Effective date: 20191016 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS SUCCESSOR AGENT, NEW YORK Free format text: ASSIGNMENT OF INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:JEFFERIES FINANCE LLC, AS EXISTING AGENT;REEL/FRAME:055345/0042 Effective date: 20210219 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: UBS AG, STAMFORD BRANCH, AS SUCCESSOR AGENT, CONNECTICUT Free format text: SECOND LIEN NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS PRIOR AGENT;REEL/FRAME:072300/0068 Effective date: 20250730 |